Chapter
5
Protection policies
This chapter includes the following topics:
■
About protection policies
■
Using protection policies
■
Adjusting the view of event types
■
Enabling or disabling logging rules
■
Defining new protection policies
■
Updating policies automatically
■
Annotating policies and events
■
Backing up protection policies
About protection policies
Symantec Network Security provides a new functionality called protection
policies, that utilize multiple components such as signature and protocol
anomaly detection to take action directly at the point of entry into the network.
Protection policies enable users to tailor the protection based on security
policies and business need. Policies can be tuned by threat category, severity,
intent, reliability, and profile of protected resources. Common or individualized
policies can be applied per sensor, for both in-line and passive monitoring.
The Symantec Network Security software and the Symantec Network Security
7100 Series appliance employ a common core architecture that provides
detection, analysis, storage, and response functionality. Most procedures in this
section apply to both the 7100 Series appliance and the Symantec Network
Security 4.0 software. The 7100 Series appliance also provides additional
functionality that is unique to an appliance. Each section describes this
additional functionality in detail.
Summary of Contents for 10521146 - Network Security 7120
Page 1: ...Symantec Network Security Administration Guide...
Page 12: ...12 Contents Index...
Page 14: ...14...
Page 70: ...70...
Page 110: ...110 Populating the topology database Adding nodes and objects...
Page 158: ...158 Responding Managing flow alert rules...
Page 188: ...188...
Page 242: ...242 Reporting Playing recorded traffic...
Page 268: ...268 Managing log files Exporting data...
Page 316: ...316 Advanced configuration Configuring advanced parameters...
Page 318: ...318...
Page 338: ...338 SQL reference Using MySQL tables...
Page 366: ...366 Glossary...
Page 392: ...392 Index...